Contribute to Intrusion8 Red Team Intelligence
Help build Threat Profiles and Threat Cases that strengthen Defensible 10 adoption through authorized education, simulation, and defensive planning.
Build the case. Pressure the standard.
1
Download Template
Get the Threat Case template and guidelines to begin your contribution.
3
Submit for Review
Submit your work for community peer review and feedback.
2
Develop Threat Case
Create your threat case following the established framework and schema.
4
Publication
Upon approval, your sub-standard becomes part of the official framework.
NOTE: Optional - ISAU allows the author’s name to be presented as the original submitter for credit and transparency.
Become a Threat Profile & Case Author
ISAUnited invites qualified technical practitioners, architects, and engineers to participate in developing Intrusion Threat Cases—the detailed, domain-specific extensions of each Threat Profile within the Defensible 10 Standards (D10S).
By contributing, you help advance cybersecurity architecture and engineering into a structured, defensible discipline practiced globally.
Registration and Vetting
To maintain the technical rigor and integrity of ISAUnited’s open standards process, all prospective Threat Profile or Case authors must register for official vetting before receiving contributor access.
Registration ensures:
-
Verification of professional background and relevant expertise in IT, cloud, software, or cybersecurity engineering.
-
Assignment to appropriate review tracks within the ISAUnited Standards Committee or the Technical Fellow Society.
-
Access to the Intrusion Vault (TA CAT, TV CAT, TT CAT), the Defensible Standards Submission Schema (D-SSF), approved author templates for Threat Profiles and Threat Cases, and supporting technical reference resources.
Upon successful vetting, registered contributors gain full access to authoring tools, reference materials, and peer-review collaboration channels.
Click the Register button to apply.
